March 19, 2016

How to Connect Cisco Nexus 9396PX to 40G Network

The traditional network usually used a three tier network architecture. However, with the migration of 40/100G, a new architecture is taking place of the traditional one with great advantages. This is known as spine-leaf architecture. ... In spine-leaf network architecture for 40G application, the connections between the spine switches and leaf switches are 40G, while connections between the leaf switches and servers are usually 1/10G. Thus these 40G QSFP+ ports can be used to connect the spine switch and the 1G SFP/10G SFP+ are suggested to connect servers and routers. To accomplish the whole spine-leaf connection, optics and cables or DAC (direct attach cable) should be used. The following picture shows a 40G spine-leaf architecture with Cisco Nexus 9396PX being used in the leaf layer and the fiber cabling choice for Cisco Nexus 9396PX switch in this architecture.

HPE IaaS reference architecture for SAP Business Applications

The solution blueprint outlined in this paper provides an Infrastructure as a Service (IaaS) Cloud infrastructure for SAP Business Applications under both traditional and SAP HANA In-Memory databases as the Cloud service. The platform provides the ease of use and flexibility needed to minimize the effort to bring legacy platforms to SAP HANA performance levels and addresses future needs coming with SAP’s newest software generation S/4HANA. The configurations are based on Hewlett Packard Enterprise servers, storage, networking and software. For customers that need maximum and dedicated database performance, this white paper describes a high performance configuration optimized for SAP HANA bare metal deployments and SAP Business Applications based on virtualization layers.

FlexPod and UCS – where are we now?

Recent announcements around the Gen 3 UCS Fabric Interconnects have revealed that 40GbE is now going to be the standard for UCS connectivity solutions, and the new chassis designs show 4 x 40GbE QSFP connections, totaling 320Gbps total bandwidth per chassis, this is an incredible throughput, and although I can’t see 99% of customers going anywhere near these levels, it does help to strengthen the UCS platform’s use cases for even the most high performance environments, and reduces the requirement for Infiniband type solutions for high throughput environments. Another interesting point, and following on from the ACI ramblings above, is that the new 6300 series Fabric Interconnects are now based on the Nexus 9300 switching line, rather than the Nexus 5K based 6200 series.

Jive prescribes collaboration software as best DNA match for healthcare

The theory here is: better collaboration could improve information, could improve patient care, could improve the fight against the nursing shortage the USA currently being experienced. According to a press statement, "Built on the cloud-based Jive-n interactive intranet, this solution improves the accessibility of nursing curriculum, best practices, specialised knowledge and peer-to-peer feedback amongst nursing educators, professionals and students." Oregon was the first US state to implement a statewide, multi-campus consortium approach for nursing education and OCNE's collaborative online community is claimed to be the first of its kind.

Getting Started with Blockchain

Blockchains are going to be useful wherever there is a need for a trustworthy record, something which is pretty vital for transactions of all sorts whether it be in banking, for legal documents or for registries of things like land or high value art works etc. Startups such as Stampery are looking to use blockchain technology to provide low cost certification services. Blockchain is not just for pure startups however. Twenty-five banks are part of the blockchain company, called R3 CEV, which aims to develop common standards around this technology. R3 CEV’s Head of Technology is Richard Gendal Brown an ex-colleague from IBM.

Open Blockchain

OBC is a modular-based protocol for recording and accessing transactions on a private ledger. Transactions, in this context, can have a wide definition, ranging from data to assets, instructions, and identities. A system that combines both the transactional processing protocol and the information store is a big advantage for multiple domains. For example, the protocol is modular so network administrators can define their own constraints and then set the protocol accordingly. This open source fabric allows infinite sets of unique actors to create their own networks. Communities create a permissioned network, where validating and non-validating nodes are operated by known whitelisted entities. These identities are granted access by an issuing authority on the network. This model is substantially different from current blockchains.

Identity theft, fraudsters, and what to know to prevent an attack

One of the pitfalls to keeping up with security trends, Platt said, "Is that there is a certain pace that organizations work at and putting changes in place can be difficult. You have to be able to make changes immediately, so you always want systems that can be changed and modified at the pace of fraud not at the pace of IT organizations." The pace of attacks has increased through technology, and according to Platt, "Some studies say that up to one-third of all traffic online is non-human." Innovation is driving change at a rapid pace, but while the technology available to people in the security industry is fast, it is changing just as fast for the bad guys. Platt said, "The pace of innovation is helping all of us so that every new attack can be identified and stopped."

BPM tools now used for complex event processing architecture

The events in the context of BPM can be internal events defined, generated or processed within the BPM tool. Examples include the instantiation or completion of a dynamic case or service levels. For example, when an assigned task is late, it is a temporal event that needs to be handled through escalation. The temporal aspect is extremely important in event processing, especially the occurrence and relationship of multiple events in a temporal window. Events can also be external, such as financial transaction events, device or machine-monitoring events and social media events. "Core intelligent complex event capabilities are becoming part of the unified BPM platform that supports intelligence holistically," Khoshafian said.

The Enterprise Architect is no Project Manager though it can be

The architect structures the description of the enterprise, establishes principles for change and evolution, standards for technologies, the roadmap... with the final aim to enable change, decision making and manage, if not reduce, the unnecessary and costly complexity and variation in the enterprise. The PM, having been given the architecture, dependencies, roadmap, risks, the work breakdown, skills and resources necessary and deliverables and acceptance criteria has to come up with a project plan and iterate it until the schedule, resources and costs are all coming together. The PM has then to monitor and report progress, bottlenecks, risks eventuation, organise meetings..

How Cognitive Computing Can Get Businesses Up And Running After Disasters

In the cognitive era, the continuous availability of data, systems, applications and business processes is essential. Organizations will take for granted that these services are “always on.” By applying advanced analytics and automation to predict potential issues, companies can correct systems in advance. At IBM, we are investing in new capabilities to help clients move from reactive business continuity and disaster recovery planning to a cognitive and predictive resiliency program. The goal is to avoid the impact of a disaster before it occurs. What if we could crunch weather data to predict the potential impact of severe weather and prompt appropriate action?

Quote for the day:

"Technological innovation is indeed important to economic growth and the enhancement of human possibilities." -- Leon Kass

No comments:

Post a Comment